Security and Trust
This section describes how CCC establishes trust, controls access, and protects sensitive information during operation. It explains the authentication and Root of Trust model, built-in security hardening measures, password and access policies, single sign-on integration, and how application data is stored and protected. Together, these topics provide an overview of the security controls enforced by CCC and the configuration options available to align the system with organizational security and compliance requirements.